<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Exchange Online — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/exchange-online/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 10:04:48 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/exchange-online/feed.xml" rel="self" type="application/rss+xml"/><item><title>Entra ID OAuth Device Code Phishing via AiTM</title><link>https://feed.craftedsignal.io/briefs/2026-05-entra-device-code-phishing/</link><pubDate>Mon, 18 May 2026 10:04:48 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-entra-device-code-phishing/</guid><description>Detects successful Microsoft Entra ID sign-ins using the OAuth device code authentication protocol with the Microsoft Authentication Broker client requesting first-party Office API resources, indicative of adversary-in-the-middle (AiTM) phishing attacks such as Tycoon 2FA.</description><content:encoded><![CDATA[<p>This detection identifies a specific pattern associated with adversary-in-the-middle (AiTM) phishing campaigns targeting Microsoft Entra ID. It focuses on successful sign-ins utilizing the OAuth device code authentication protocol in conjunction with the Microsoft Authentication Broker client. A key characteristic is the request for first-party Office API resources, specifically Exchange Online, Microsoft Graph, or SharePoint. The activity is flagged as interactive. This tactic is linked to AiTM phishing kits like Tycoon 2FA, where unsuspecting victims are tricked into completing device code flows, ultimately granting attackers access tokens for mail and collaboration APIs. This allows unauthorized access to sensitive data and resources within the organization&rsquo;s cloud environment. The blog post from Microsoft on February 13, 2025, highlights the Storm-2372 campaign which utilizes this technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a phishing email or message to the victim containing a link or QR code.</li>
<li>The victim clicks on the link or scans the QR code, which redirects them to a fake Microsoft login page controlled by the attacker.</li>
<li>The fake login page prompts the victim to enter a device code.</li>
<li>The attacker initiates a legitimate OAuth device code flow using the Microsoft Authentication Broker client.</li>
<li>The victim enters the device code on the attacker-controlled page, unknowingly authorizing the attacker&rsquo;s application.</li>
<li>The attacker&rsquo;s application requests access to first-party Office API resources, such as Exchange Online (resource ID 00000002-0000-0ff1-ce00-000000000000), Microsoft Graph (00000003-0000-0ff1-ce00-000000000000), or SharePoint (00000005-0000-0ff1-ce00-000000000000).</li>
<li>The Microsoft Authentication Broker authenticates the request as interactive.</li>
<li>The attacker gains access to the victim&rsquo;s mail and collaboration APIs via the obtained access tokens, enabling data exfiltration and other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to unauthorized access to the victim&rsquo;s Microsoft Entra ID account and associated resources, including email, files, and other sensitive data. This can result in data theft, financial loss, and reputational damage to the organization. The Tycoon 2FA kit, as referenced, facilitates this type of attack, bypassing traditional multi-factor authentication methods. The scale of impact depends on the scope of access granted to the compromised account.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Entra ID OAuth Device Code Phishing via AiTM&rdquo; to your SIEM to detect suspicious device code authentication flows.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on <code>azure.signinlogs.properties.user_principal_name</code>, <code>azure.signinlogs.properties.session_id</code>, <code>source.ip</code>, and <code>azure.signinlogs.properties.resource_display_name</code>.</li>
<li>Implement conditional access policies to restrict device code flows to trusted networks and devices, mitigating the risk of AiTM attacks (reference: Microsoft documentation on conditional access).</li>
<li>Revoke refresh tokens for any compromised users and reset their credentials per policy, as mentioned in the investigation steps.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cloud</category><category>identity</category><category>azure</category><category>entra_id</category><category>phishing</category></item><item><title>Microsoft 365 AiTM UserLoggedIn via Office App (Tycoon2FA)</title><link>https://feed.craftedsignal.io/briefs/2026-05-tycoon-aitm-o365/</link><pubDate>Mon, 18 May 2026 09:26:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-tycoon-aitm-o365/</guid><description>This rule detects Microsoft 365 audit events indicative of Tycoon 2FA phishing-as-a-service (PhaaS) adversary-in-the-middle (AiTM) activity, identifying UserLoggedIn events where the Microsoft Authentication Broker requests access to Microsoft Graph or Exchange Online, or the Office web client application authenticates to itself, combined with Node.js-style user agents, bypassing MFA by relaying authentication and capturing session material.</description><content:encoded><![CDATA[<p>This detection focuses on identifying adversary-in-the-middle (AiTM) phishing activity targeting Microsoft 365 environments, specifically related to the Tycoon 2FA phishing-as-a-service platform. The attack leverages AiTM techniques to bypass multi-factor authentication (MFA) by relaying authentication requests and capturing session cookies. The detection is based on the observation of specific Microsoft 365 audit events, namely &ldquo;UserLoggedIn&rdquo;, combined with anomalous user agent strings indicative of Node.js-based tooling (node, axios, undici). The activity involves the Microsoft Authentication Broker requesting access to Microsoft Graph or Exchange Online, or the Office web client authenticating to itself, which are patterns associated with Tycoon 2FA. Defenders should baseline legitimate automation and developer tooling environments to avoid false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker initiates a phishing campaign targeting Microsoft 365 users to steal credentials and bypass MFA.</li>
<li>The victim receives a phishing email or message containing a link to a malicious proxy site that spoofs a legitimate Microsoft 365 login page.</li>
<li>The victim clicks on the link and enters their credentials into the fake login page.</li>
<li>The attacker&rsquo;s proxy site relays the credentials to the real Microsoft 365 login page.</li>
<li>The real Microsoft 365 login page sends an MFA request to the victim.</li>
<li>The attacker&rsquo;s proxy site relays the MFA request to the victim and captures the MFA code.</li>
<li>The attacker&rsquo;s proxy site relays the MFA code to the real Microsoft 365 login page, completing the authentication process.</li>
<li>The attacker captures the session cookie, allowing them to access the victim&rsquo;s Microsoft 365 account without needing the credentials or MFA code again.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain unauthorized access to Microsoft 365 accounts, potentially leading to data exfiltration, financial fraud, or further lateral movement within the organization. The use of Tycoon 2FA underscores the increasing sophistication of phishing attacks, making it more difficult for users to detect and avoid. Without proper detection and response mechanisms, organizations are vulnerable to significant compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;M365 Potential AiTM UserLoggedIn via Office App (Tycoon2FA)&rdquo; to your SIEM and tune for your environment to detect suspicious login patterns.</li>
<li>Review <code>o365.audit.UserId</code>, <code>user_agent.original</code>, <code>source.ip</code> or <code>o365.audit.ActorIpAddress</code>, and related Entra ID sign-in logs (<code>azure.signinlogs</code>) for the same session or time window as described in the rule&rsquo;s &ldquo;Triage and Analysis&rdquo; section.</li>
<li>Revoke refresh tokens for compromised users, reset credentials per policy, and review conditional access outcomes if malicious activity is confirmed, as outlined in the rule&rsquo;s &ldquo;Response and Remediation&rdquo; section.</li>
<li>Block or monitor the source IPs identified in the logs and escalate per incident procedures, as suggested in the rule&rsquo;s &ldquo;Response and Remediation&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cloud</category><category>identity</category><category>saas</category><category>microsoft365</category><category>aitm</category><category>tycoon2fa</category><category>phishing</category></item><item><title>Tycoon2FA AiTM Phishing via Microsoft Entra ID Sign-Ins</title><link>https://feed.craftedsignal.io/briefs/2026-05-tycoon2fa-entra-id/</link><pubDate>Mon, 18 May 2026 09:26:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-tycoon2fa-entra-id/</guid><description>Detects Microsoft Entra ID sign-ins consistent with Tycoon2FA phishing-as-a-service (PhaaS) adversary-in-the-middle (AiTM) activity targeting Microsoft 365 and Gmail, where the Microsoft Authentication Broker requests tokens for Microsoft Graph or Exchange Online, or the Office web client application authenticates to itself, combined with Node.js-style user agents (node, axios, undici).</description><content:encoded><![CDATA[<p>This rule detects Microsoft Entra ID sign-ins indicative of Tycoon2FA phishing-as-a-service (PhaaS) adversary-in-the-middle (AiTM) attacks. Tycoon2FA is designed to bypass multi-factor authentication (MFA) by relaying authentication requests and capturing session cookies, primarily targeting Microsoft 365 and Gmail accounts. The activity is characterized by the Microsoft Authentication Broker (app ID <code>29d9ed98-a469-4536-ade2-f981bc1d605e</code>) requesting tokens for Microsoft Graph (<code>00000003-0000-0000-c000-000000000000</code>) or Exchange Online (<code>00000002-0000-0ff1-ce00-000000000000</code>), or the Office web client application (app ID <code>4765445b-32c6-49b0-83e6-1d93765276ca</code>) authenticating to itself, in conjunction with Node.js-style user agents (node, axios, undici). Defenders should baseline legitimate automation and developer tooling using these patterns to minimize false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The victim receives a phishing email or message designed to mimic a legitimate Microsoft 365 login page.</li>
<li>The victim clicks the link and is redirected to a Tycoon2FA-controlled server acting as a proxy.</li>
<li>The victim enters their credentials, which are captured by the Tycoon2FA proxy.</li>
<li>The Tycoon2FA proxy initiates a legitimate sign-in attempt to Microsoft Entra ID using the stolen credentials and relays the MFA request to the victim.</li>
<li>The victim completes MFA, and the Tycoon2FA proxy captures the session cookie.</li>
<li>The attacker uses the stolen session cookie to bypass MFA and gain access to the victim&rsquo;s Microsoft 365 account, impersonating the user.</li>
<li>The attacker leverages this access to perform actions such as reading emails, accessing files, or initiating further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to account compromise and unauthorized access to sensitive data within Microsoft 365 and Gmail environments. This can result in data breaches, financial loss, and reputational damage. Tycoon2FA is a phishing-as-a-service (PhaaS) platform, enabling even less sophisticated attackers to successfully bypass MFA, potentially affecting a large number of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect potential AiTM attacks targeting Microsoft Entra ID.</li>
<li>Monitor Microsoft Entra ID sign-in logs for the specific application IDs (<code>29d9ed98-a469-4536-ade2-f981bc1d605e</code>, <code>4765445b-32c6-49b0-83e6-1d93765276ca</code>) and resource IDs (<code>00000002-0000-0ff1-ce00-000000000000</code>, <code>00000003-0000-0000-c000-000000000000</code>) associated with Tycoon2FA, as described in the overview.</li>
<li>Investigate sign-ins originating from unusual user agents, especially those containing &ldquo;node&rdquo;, &ldquo;axios&rdquo;, or &ldquo;undici&rdquo; when used in conjunction with the Microsoft Authentication Broker or Office web client application.</li>
<li>Review conditional access policies and MFA configurations to ensure they are effectively preventing AiTM attacks.</li>
<li>Educate users about phishing techniques and the importance of verifying login pages and MFA requests.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>tycoon2fa</category><category>aitm</category><category>entra_id</category><category>phishing</category><category>credential_access</category></item></channel></rss>